computerandcybersecurity.com
Open in
urlscan Pro
83.136.249.213
Public Scan
Effective URL: https://computerandcybersecurity.com/
Submission: On August 29 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by R3 on June 7th 2021. Valid for: 3 months.
This is the only time computerandcybersecurity.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 20 | 83.136.249.213 83.136.249.213 | 202053 (UPCLOUD) (UPCLOUD) | |
3 | 2a00:1450:400... 2a00:1450:4001:82a::2003 | 15169 (GOOGLE) (GOOGLE) | |
22 | 2 |
ASN202053 (UPCLOUD, FI)
PTR: 83-136-249-213.uk-lon1.upcloud.host
www.computerandcybersecurity.com | |
computerandcybersecurity.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
computerandcybersecurity.com
1 redirects
www.computerandcybersecurity.com computerandcybersecurity.com |
2 MB |
3 |
gstatic.com
fonts.gstatic.com |
335 KB |
22 | 2 |
Domain | Requested by | |
---|---|---|
19 | computerandcybersecurity.com |
computerandcybersecurity.com
|
3 | fonts.gstatic.com |
computerandcybersecurity.com
|
1 | www.computerandcybersecurity.com | 1 redirects |
22 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.facebook.com |
twitter.com |
plus.google.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
computerandcybersecurity.com R3 |
2021-06-07 - 2021-09-05 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2021-08-16 - 2021-11-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://computerandcybersecurity.com/
Frame ID: 155EF9DBBA08C70D00031CEA9CC1ED2C
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
Computer and Cybersecurity BlogPage URL History Show full URLs
-
https://www.computerandcybersecurity.com/
HTTP 301
https://computerandcybersecurity.com/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
30 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.computerandcybersecurity.com/
HTTP 301
https://computerandcybersecurity.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
computerandcybersecurity.com/ Redirect Chain
|
105 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wpo-minify-header-c1c72f8d.min.css
computerandcybersecurity.com/wp-content/cache/wpo-minify/1623841545/assets/ |
335 KB 56 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wpo-minify-header-e3530db2.min.js
computerandcybersecurity.com/wp-content/cache/wpo-minify/1623841545/assets/ |
190 KB 66 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
computerandcybersecurity.com/wp-content/uploads/2020/06/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pixel.gif
computerandcybersecurity.com/wp-content/plugins/wti-like-post/images/ |
43 B 363 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
layzyload-list.jpg
computerandcybersecurity.com/wp-content/themes/zum/assets/images/ |
2 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wpo-minify-footer-092441c8.min.js
computerandcybersecurity.com/wp-content/cache/wpo-minify/1623841545/assets/ |
402 KB 120 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiEyp8kv8JHgFVrFJM.woff
fonts.gstatic.com/s/poppins/v15/ |
65 KB 65 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiByp8kv8JHgFVrLGT9V1g.woff
fonts.gstatic.com/s/poppins/v15/ |
64 KB 64 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
themify.woff
computerandcybersecurity.com/wp-content/themes/zum/assets/css/fonts/font-themify/ |
55 KB 55 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
computerandcybersecurity.com/wp-content/plugins/js_composer/assets/lib/bower/font-awesome/fonts/ |
75 KB 76 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga6Law1J5X9T9RW6j9bNdOwzTRM.woff
fonts.gstatic.com/s/notoserif/v9/ |
205 KB 205 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1280px-Microsoft_Office_OneDrive_2018%E2%80%93present.svg_.png
computerandcybersecurity.com/wp-content/uploads/2020/12/ |
36 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tv-5571609_1920.jpg
computerandcybersecurity.com/wp-content/uploads/2020/12/ |
271 KB 271 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
maxresdefault.jpg
computerandcybersecurity.com/wp-content/uploads/2021/02/ |
74 KB 75 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
broken-business-2237920_1920.jpg
computerandcybersecurity.com/wp-content/uploads/2021/02/ |
226 KB 227 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pc-3540378_1920.jpg
computerandcybersecurity.com/wp-content/uploads/2021/02/ |
461 KB 461 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2pc-3540378_1920.jpg
computerandcybersecurity.com/wp-content/uploads/2021/02/ |
809 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1280px-Windows10abstract.png
computerandcybersecurity.com/wp-content/uploads/2020/12/ |
51 KB 51 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
domenico-loia-rPkgcGHfDUo-unsplash.jpg
computerandcybersecurity.com/wp-content/uploads/2021/02/ |
319 KB 319 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alvin-mahmudov-vKuEhorbvYI-unsplash.jpg
computerandcybersecurity.com/wp-content/uploads/2020/11/ |
473 KB 474 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1pc-3540378_1920.jpg
computerandcybersecurity.com/wp-content/uploads/2021/02/ |
64 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
45 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| wtilp undefined| $ function| jQuery string| daim_ajax_url string| daim_nonce object| wpcf7 object| NaScript object| __core-js_shared__ object| core function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| jQueryBridget function| EvEmitter function| getSize function| matchesSelector object| fizzyUIUtils function| Outlayer function| Isotope function| Masonry object| jQuery1124002948304447945649 object| classie function| EventEmitter object| eventie function| getStyleProperty function| docReady function| Flickity function| Unipointer function| Unidragger function| TapListener function| imagesLoaded object| html5 object| wp0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubdomains; preload |
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
computerandcybersecurity.com
fonts.gstatic.com
www.computerandcybersecurity.com
2a00:1450:4001:82a::2003
83.136.249.213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